Virtualization+Security

The other day i was preparing a presentation about competing priorities in Information Security and thought it would be a nice idea to add a tongue in cheek reference to the usual Confidentiality, Integrity and Availability triad. With the ‘Good, Cheap, Fast – pick two’ model in mind i went to search for a suitable […]

Looks like Information Systems Frontiers – A Journal of Research and Innovation published one of my papers. This one is taking a systematic look at literature related to measuring value of Information Security in organisations. Research on technological aspects of information security risk is a well-established area and familiar territory for most information security professionals. The same […]

Information and Computer Security has published one of my research papers on the impact of repeated data breaches on the market value of organisations. Purpose – This study aims to examine the influence of one or more information security breaches on an organisation’s stock market value as a way to benchmark the wider economic impact […]

As i’m listening to the ‘Ponemon Study: True Cost of a Data Breach‘ webcast on BrightTalk i’m being reminded of the prevalence of data breaches and the fact that many organisations are still not prepared for it. As I’ve already written on this topic for Computer Weekly i’ll just refer back to that article copied below […]

Recently i had the need to convert scholarly references in a plain text document to references that can be managed in my reference manager. Naturally i hoped that my trusted EndNote X7 would assist me with this cumbersome task but i soon found out that this is not the case. After some minutes looking through […]